FIRESTARTER Backdoor Survives Patches: 5 Critical Threats This Week
A backdoor planted inside Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) firmware persisted on a U.S. federal agency's network for more than six months — surviving every software patch, firmware update, and standard reboot applied during that period. CISA and the United Kingdom's National Cyber Security Centre (NCSC) jointly disclosed the FIRESTARTER backdoor in a malware analysis report published this week, revealing that UAT-4356, the nation-state group behind the 2024 ArcaneDoor espionage campaign, has built a persistence mechanism that fundamentally changes the remediation calculus for compromised network perimeter devices.
FIRESTARTER is a Linux ELF binary engineered to execute within LINA — Cisco's core networking and packet-processing engine — under the malicious process name `lina_cs`. Persistence is maintained by manipulating the Cisco Service Platform mount list, the configuration file that governs which binaries execute at boot. When the device detects any shutdown or reboot signal, FIRESTARTER copies itself to a secondary FXOS storage location and rewrites the mount list to ensure self-restoration after restart. Cisco's September 2025 patches for CVE-2025-20333 and CVE-2025-20362 closed the original access vulnerabilities — but devices compromised before patching retained the implant completely unaffected.
The practical consequence emerged in March 2026: UAT-4356 used surviving FIRESTARTER persistence to redeploy a secondary implant called Line Viper — which harvests device configurations, credentials, and encryption keys — nearly six months after the initial breach. Teams relying on patch compliance as their sole remediation measure had no indication their perimeter devices remained fully compromised throughout. Alongside FIRESTARTER, this week brought two unpatched Microsoft Defender zero-days still actively exploited, eight new CISA KEV additions, a Bitwarden CLI supply chain attack, and the GopherWhisper China-aligned APT disclosure — a dense threat week demanding prioritised response.
How FIRESTARTER Survives Cisco ASA Firmware Updates Through Mount List Manipulation
FIRESTARTER's persistence architecture targets the Cisco Firepower eXtensible Operating System (FXOS) at a layer below where standard firmware updates make changes. The malware runs inside the LINA process — Cisco's core networking engine — as the malicious subprocess `lina_cs`. This placement provides both concealment within a legitimate system process and the privileged execution context required for network traffic interception.
Persistence operates through three stages: on infection, FIRESTARTER writes itself to an FXOS-accessible location and modifies the Cisco Service Platform mount list to include its own launch entry; on any termination signal (shutdown, reboot, or upgrade), it copies itself to a secondary location and rewrites mount list entries to ensure post-restart recovery; and it intercepts VPN authentication traffic, extracting attacker-embedded trigger sequences to execute commands via a covert channel that bypasses the management interface entirely.
Cisco's September 2025 patches for CVE-2025-20333 (Critical, Missing Authorization in the VPN web server component) and CVE-2025-20362 (High, buffer overflow) addressed the initial access vectors. Because firmware updates overwrite the software image but do not audit the mount list or secondary storage locations, devices compromised before patching retained FIRESTARTER through the update with no change in behaviour. This is the architectural choice that enabled UAT-4356 to operate undetected inside what organisations believed was remediated infrastructure — a technique first seen in the [ArcaneDoor campaign targeting Cisco ASA](/blog/cve-2024-20353-cve-2024-20359-cisco-asa-arcanedoor) but now evolved to survive the patch itself.
CVE-2025-20333 — Unauthenticated Remote Code Execution
UAT-4356 sends crafted requests to the Cisco ASA/FTD VPN web server component, exploiting a Missing Authorization flaw (CWE-862) to achieve unauthenticated remote code execution and gain initial access to the device without credentials.
FIRESTARTER Implanted in LINA Process as lina_cs
Linux ELF binary dropped into FXOS and injected into Cisco's core LINA networking process as the malicious subprocess lina_cs, providing privileged access to all network traffic and execution within a legitimate system process.
Mount List Modified for Boot-Level Persistence
FIRESTARTER modifies the Cisco Service Platform mount list — the boot-sequence configuration — to include its own launch entry. On any shutdown signal, it copies itself to secondary FXOS storage and rewrites entries to ensure automatic restoration after reboot.
Cisco Firmware Patches Applied — Implant Survives Unchanged
September 2025 patches for CVE-2025-20333 and CVE-2025-20362 close the initial access vectors. FIRESTARTER remains fully intact: firmware updates overwrite the software image but do not touch the mount list or secondary storage where the implant lives.
Line Viper Redeployed Six Months Later via FIRESTARTER C2
March 2026: UAT-4356 uses the surviving FIRESTARTER covert channel — VPN authentication trigger sequences — to deploy Line Viper, a secondary implant that harvests device configurations, stored credentials, VPN pre-shared keys, and encryption keys.
Six-Plus Months Undetected: FIRESTARTER's Scope Across US Federal Infrastructure
CISA discovered FIRESTARTER after identifying suspicious network connections on a U.S. Federal Civilian Executive Branch (FCEB) agency's Cisco Firepower device — a finding that triggered a forensic engagement revealing the extent to which standard remediation had failed. The confirmed timeline: initial access was achieved via CVE-2025-20333 and CVE-2025-20362 before Cisco's September 2025 patches. The FCEB agency applied those patches. FIRESTARTER remained operational and undetected.
In March 2026, six-plus months after the initial breach, UAT-4356 activated surviving FIRESTARTER persistence to redeploy Line Viper — a secondary implant designed for long-term intelligence collection. Line Viper targets device configuration files, stored credential databases, encryption keys, and VPN authentication material. For an espionage-focused adversary — consistent with ArcaneDoor's profile and Censys researchers' China attribution assessment — this represents sustained visibility into every branch site, VPN connection, and network segment managed by the compromised firewall.
Affected hardware: Firepower 1000, 2100, 4100, 9300, and Secure Firewall 1200, 3100, 4200 series. Not affected: ASA 5500-X, Secure Firewall 200/6100, ASA Virtual, FTD Virtual, ISA3000, and Secure Firewall TDv — providing immediate scoping clarity. CISA updated Emergency Directive 25-03 to mandate FIRESTARTER remediation across federal environments. Any organisation that applied Cisco patches in September 2025 and considered remediation complete must now treat devices as potentially compromised pending the CLI audit described in the detection section below.
“When the agency patched its systems, Firestarter stayed on the devices, and the actors used it to then redeploy Line Viper in March, nearly six months after the initial breach.”
— The Record, Recorded Future News — reporting on CISA forensic findings, April 2026
Three Microsoft Defender Zero-Days: BlueHammer Patched, RedSun and UnDefend Still Open
April 2026 produced a trifecta of Microsoft Defender local privilege escalation zero-days — and two remain unpatched as of this writing. Security researcher 'Chaotic Eclipse' dropped a fully functional exploit for BlueHammer (CVE-2026-33825) on GitHub on April 3, 2026. Active in-the-wild exploitation was confirmed on April 10. Microsoft patched it in the [April 2026 Patch Tuesday](/blog/patch-tuesday-april-2026) release on April 14. CISA added CVE-2026-33825 to its KEV catalog on April 22 with a federal remediation deadline of May 7.
BlueHammer exploits a time-of-check to time-of-use (TOCTOU) race condition in Defender's threat remediation engine. During malware cleanup, Defender performs privileged file operations without adequately validating the file path at the time of the write. An attacker downloads a legitimate Defender definition update, places an opportunistic lock (oplock) on it to gain privileged file access, then creates a symbolic link that redirects Defender's write operation — achieving SYSTEM-level privileges from a low-privilege user account without triggering standard detection.
RedSun and UnDefend — two additional Defender zero-days disclosed by independent researchers in mid-April — remain unpatched. All three vulnerabilities have been confirmed actively exploited in the wild as of April 17, 2026. Microsoft has not disclosed a public timeline for RedSun or UnDefend fixes. Defenders should subscribe to Microsoft Security Response Center advisories and treat any patch for these two vulnerabilities as emergency deployment given ongoing active exploitation. Limiting local user account privileges provides only partial mitigation for a privileged process-level attack chain.
“BlueHammer exploits a TOCTOU race condition in Defender's threat remediation engine — a privileged file operation performed during malware cleanup that does not adequately validate the file path at the time of the write operation.”
— Picus Security Research — BlueHammer & RedSun Zero-Day Vulnerability Analysis, April 2026
CISA KEV April 13–22, 2026: Eighteen Additions Spanning Microsoft, Cisco, Fortinet, and More
CISA added eighteen vulnerabilities to its Known Exploited Vulnerabilities catalog across six advisories published between April 13 and April 22, 2026. The additions span enterprise platforms including Microsoft SharePoint, Windows Defender, Zimbra Collaboration Suite, JetBrains TeamCity, Cisco Catalyst SD-WAN Manager, Adobe Acrobat, and Fortinet.
The April 13 batch included CVE-2026-21643 (Fortinet SQL injection), CVE-2026-34621 (Adobe Acrobat Prototype Pollution), and five older Microsoft vulnerabilities. CVE-2026-32201 — a Microsoft SharePoint Server spoofing zero-day — was added April 14 with confirmed active exploitation. The April 20 batch of eight included PaperCut NG/MF (CVE-2023-27351), JetBrains TeamCity path traversal (CVE-2024-27199), Kentico Xperience (CVE-2025-2749), Quest KACE (CVE-2025-32975), Zimbra XSS (CVE-2025-48700), and the three Cisco SD-WAN Manager CVEs. BlueHammer (CVE-2026-33825) was added April 22.
Federal agencies face mandatory remediation deadlines for every KEV entry. For the private sector, a CISA KEV designation is the clearest signal that exploitation is confirmed, attack tooling is actively deployed, and unpatched systems are current targets. The prioritised patch sequence for this week's additions follows below.
CVE-2026-32201 — Microsoft SharePoint Server Spoofing (PATCH IMMEDIATELY)
Actively exploited zero-day. Unauthenticated network-based spoofing via input validation weakness. Apply April 2026 Patch Tuesday update immediately. No functional workaround available.
CVE-2026-33825 — BlueHammer, Windows Defender Privilege Escalation (Federal deadline May 7)
TOCTOU race condition enabling local user to gain SYSTEM. Fixed in April 14 Patch Tuesday. Active exploitation confirmed since April 10. CISA KEV deadline May 7, 2026 for federal agencies.
CVE-2025-2749 — Kentico Xperience Path Traversal
Added to KEV April 20. Path traversal in Kentico Xperience CMS enabling reads and writes outside the web root. Patch to latest version immediately on any internet-accessible deployment.
CVE-2025-32975 — Quest KACE Systems Management Appliance Improper Authentication
Added KEV April 20. Unauthenticated access to Quest KACE SMA — a platform managing endpoints across enterprise environments and a high-value lateral movement pivot point.
CVE-2025-48700 — Zimbra Collaboration Suite XSS
Added KEV April 20. Cross-site scripting enabling session hijacking and account takeover. Apply Zimbra patches immediately; restrict the Zimbra admin console to trusted source IPs.
Bitwarden CLI Supply Chain Attack, GopherWhisper APT, and UNC6692 Teams Social Engineering
Three additional high-priority threats completed a dense threat week beyond FIRESTARTER and the Defender zero-days.
**Bitwarden CLI supply chain attack.** Security researchers at JFrog and Socket identified a malicious version of the Bitwarden CLI npm package — `@bitwarden/cli@2026.4.0` — as part of the Checkmarx supply chain campaign. The rogue package exfiltrates GitHub and npm tokens, SSH key directories, `.env` files, shell history, GitHub Actions secrets, and cloud credentials to attacker-controlled private domains and as GitHub commits. Any CI/CD pipeline that pulled this version should be treated as fully compromised with immediate credential rotation required.
**GopherWhisper APT.** A previously undocumented China-aligned advanced persistent threat group tracked as GopherWhisper is targeting Mongolian government entities using a Go-based custom toolkit. The group abuses legitimate cloud platforms — Discord, Slack, Microsoft 365 Outlook, and file.io — for command-and-control and exfiltration, blending C2 traffic with normal enterprise communication patterns. Detection requires monitoring for anomalous API call volumes to these platforms from server-class or infrastructure assets, not endpoint-level filtering.
**UNC6692 Microsoft Teams social engineering.** A threat cluster designated UNC6692 is running a sophisticated two-phase campaign: attackers flood a target's inbox with spam to create urgency, then approach via Microsoft Teams claiming to be IT support responding to the email problem. Upon engagement, a custom malware suite is deployed. This technique exploits inherent trust in internal collaboration tools to bypass email security controls — and highlights the need for out-of-band verification before any IT support interaction initiated via Teams or similar platforms.
| Artifact | Type | SHA-256 (Truncated) |
|---|---|---|
| @bitwarden/cli@2026.4.0 | Malicious npm Package | Checkmarx supply chain — JFrog and Socket confirmed; steals GitHub/npm tokens, SSH keys, .env files, cloud secrets |
| GopherWhisper C2 Channels | Legitimate Service Abuse | Discord, Slack, Microsoft 365 Outlook, file.io — detect via anomalous API call volumes from server assets |
| UNC6692 Teams Lure | Social Engineering Vector | Email bomb + Teams IT-support impersonation — verify all IT support contacts out-of-band before engaging |
Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.
Detecting FIRESTARTER: Cisco CLI Commands and IOC Reference
CISA and Cisco have identified a single reliable detection command for FIRESTARTER that works on all affected hardware. Run this on every in-scope device as the first triage step:
``` show kernel process | include lina_cs ```
Any output confirms FIRESTARTER infection. A clean device returns no results. The malicious subprocess `lina_cs` runs within LINA and is not present on uncompromised devices under any normal operating condition.
Beyond the CLI check, hunt in network telemetry for: unexpected outbound connections from firewall management interfaces to external IPs during non-maintenance windows; VPN authentication events with unusual payload lengths or non-standard encoding patterns that may embed UAT-4356 trigger sequences; and any configuration changes to the Cisco Service Platform mount list visible in FXOS debug logs.
CISA's complete indicator set — including FIRESTARTER ELF file hashes — is available in Malware Analysis Report AR26-113a at cisa.gov. For Line Viper (the secondary implant deployed post-persistence), indicators include access to device configuration databases, certificate stores, and pre-shared key files outside normal operational windows.
UAT-4356's toolkit also includes RayInitiator, a prior-generation implant with significant technical similarities to FIRESTARTER, suggesting iterative development of the same persistence capability. Organisations whose Cisco Firepower devices have been internet-accessible since 2024 should hunt for RayInitiator IOCs alongside FIRESTARTER — the group may have established earlier footholds that FIRESTARTER replaced or supplemented.
| Artifact | Type | SHA-256 (Truncated) |
|---|---|---|
| lina_cs (subprocess within LINA) | Malicious Process — Cisco FXOS | Detection: show kernel process | include lina_cs — any output confirms infection |
| FIRESTARTER Linux ELF Binary | FXOS Persistent Implant | Full hash set published in CISA Malware Analysis Report AR26-113a — cisa.gov |
| Line Viper | Secondary Implant — Credential and Config Harvester | Deployed via FIRESTARTER C2 channel; targets device configs, credential stores, encryption keys |
| RayInitiator | Prior-Generation UAT-4356 Implant | Significant technical similarity to FIRESTARTER; hunt in parallel for devices reachable since 2024 |
Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.
Weekly Remediation Checklist: FIRESTARTER, Defender Zero-Days, and KEV Priorities
This week's threat landscape requires action across three priority tracks. Execute them in order.
**Track 1 — FIRESTARTER (Immediate, all Cisco Firepower/Secure Firewall environments):** Run the detection command on every in-scope device. Clean results still require patching to current Cisco software to close CVE-2025-20333 and CVE-2025-20362. Positive results require: physical power disconnect (not software reload) to clear memory persistence, full FXOS reimaging from a known-good image, reconfiguration from authenticated backups, and rotation of all credentials, certificates, VPN pre-shared keys, and encryption keys the device held.
**Track 2 — Microsoft Defender (Federal deadline May 7 for BlueHammer, ongoing for RedSun and UnDefend):** Apply the April 14 Windows update immediately to patch BlueHammer across all Windows endpoints and servers. Subscribe to Microsoft Security Response Center alerts for RedSun and UnDefend — treat any patch for these as emergency deployment. Limit local account privileges as a partial interim mitigation only.
**Track 3 — Supply chain and social engineering hygiene:** Audit all CI/CD pipelines for @bitwarden/cli@2026.4.0; rotate any credentials that pipeline held access to. Establish out-of-band verification procedures for all IT support interactions initiated via Microsoft Teams or similar tools — UNC6692's campaign specifically exploits the trust users place in internal collaboration platforms.
Run FIRESTARTER detection on every in-scope Cisco device
Execute `show kernel process | include lina_cs` on every Cisco Firepower 1000/2100/4100/9300 and Secure Firewall 1200/3100/4200 device. Any output confirms infection and mandates immediate hard power-cycle and FXOS reimage.
Reimage — not just reboot — any confirmed infected device
Standard `reload` does not remove FIRESTARTER. Physically disconnect power to clear memory, reimage from a verified FXOS image, reconfigure from authenticated backups, and rotate all credentials, certificates, and encryption keys.
Patch BlueHammer before CISA's May 7 federal deadline
CVE-2026-33825 (Windows Defender TOCTOU LPE to SYSTEM) is in CISA KEV with a May 7 deadline. The fix shipped in April 14 Patch Tuesday. Deploy across all Windows environments immediately — exploitation has been ongoing since April 10.
Monitor for RedSun and UnDefend patches — apply within hours of release
Two additional Defender zero-days remain unpatched as of April 24. Subscribe to Microsoft MSRC alerts; these should be treated as emergency patches given confirmed in-the-wild exploitation with no vendor fix yet available.
Audit Bitwarden CLI across all CI/CD pipelines
Any pipeline using @bitwarden/cli@2026.4.0 (Checkmarx malicious supply chain version) is compromised. Rotate GitHub/npm tokens, SSH keys, .env secrets, GitHub Actions secrets, and all cloud credentials accessible to that pipeline.
Implement out-of-band IT support verification against UNC6692
UNC6692 combines email bombing with Teams IT-support impersonation to deploy malware. Require phone or in-person verification before any IT support interaction that arrives via Microsoft Teams, Slack, or other collaboration tools.
The bottom line
The FIRESTARTER backdoor establishes that network device implants engineered to survive firmware patch boundaries require fundamentally different remediation than software CVEs. Running `show kernel process | include lina_cs` on every in-scope Cisco Firepower device is the non-negotiable first action — a clean result still requires patching CVE-2025-20333 and CVE-2025-20362; a positive result requires physical power-cycling and full FXOS reimaging. Simultaneously, apply the BlueHammer fix across all Windows environments before May 7, monitor for the two remaining unpatched Microsoft Defender zero-days, and treat any use of Bitwarden CLI version 2026.4.0 in CI/CD as a confirmed supply chain compromise requiring immediate credential rotation.
Frequently asked questions
What is the FIRESTARTER backdoor targeting Cisco ASA?
FIRESTARTER is a Linux ELF binary implanted in Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) firmware by the nation-state group UAT-4356. It runs inside Cisco's core LINA networking process as the malicious subprocess lina_cs and establishes persistence by modifying the Cisco Service Platform mount list — the boot-sequence configuration file. CISA and the UK NCSC jointly disclosed FIRESTARTER in April 2026 after finding it on a US federal agency's device.
How does FIRESTARTER persist on Cisco Firepower after patching?
FIRESTARTER survives patching by targeting persistence layers below the firmware update boundary. When the device shuts down or reboots, the malware copies itself to a secondary FXOS storage location and rewrites the mount list to ensure self-restoration after restart. Cisco's September 2025 patches for CVE-2025-20333 and CVE-2025-20362 closed the initial access vectors but did not touch the mount list or secondary storage — leaving FIRESTARTER fully operational through every standard firmware update applied afterward.
Is UAT-4356 the same group that ran ArcaneDoor in 2024?
Yes. Cisco Talos attributed FIRESTARTER to UAT-4356 and assessed with high confidence it is the same group behind the ArcaneDoor espionage campaign discovered in 2024, which also targeted Cisco network perimeter devices. Censys researchers separately assessed the group as China-based. Neither Cisco nor CISA have made a formal nation-state attribution in their public advisories, but the technical similarities between FIRESTARTER, its predecessor RayInitiator, and ArcaneDoor tooling are documented.
Which Cisco Firepower models are affected by CVE-2025-20333?
Confirmed affected hardware: Cisco Firepower 1000, 2100, 4100, and 9300 series; and Cisco Secure Firewall 1200, 3100, and 4200 series. Confirmed NOT affected: ASA 5500-X, Secure Firewall 200/6100, ASA Virtual, Firepower Threat Defense Virtual, ISA3000, and Secure Firewall TDv. Organisations can use this scoping list to immediately prioritise which devices require the FIRESTARTER detection command.
How do I detect FIRESTARTER on my Cisco firewall?
Run the following command on every in-scope Cisco Firepower or Secure Firewall device: `show kernel process | include lina_cs`. Any output from this command confirms FIRESTARTER infection — a clean device returns no results. CISA's full IOC set including FIRESTARTER ELF file hashes is available in Malware Analysis Report AR26-113a at cisa.gov. Confirmed infected devices require a hard power-cycle (physical power disconnect) followed by full FXOS reimaging — a standard software reload is not sufficient.
What are BlueHammer, RedSun, and UnDefend — the three Microsoft Defender zero-days?
BlueHammer (CVE-2026-33825) is a TOCTOU race condition in Defender's threat remediation engine allowing local privilege escalation to SYSTEM. It was patched in the April 14, 2026 Patch Tuesday and added to CISA KEV on April 22 with a federal deadline of May 7. RedSun and UnDefend are two additional Microsoft Defender zero-days disclosed in mid-April 2026 that remain unpatched as of April 24 — both are confirmed actively exploited in the wild with no vendor patch yet available.
What did CISA add to the KEV catalog in April 2026?
CISA added 18+ vulnerabilities across six advisories between April 13 and April 22, 2026. Key additions include CVE-2026-32201 (Microsoft SharePoint zero-day, actively exploited), CVE-2026-33825 (BlueHammer, Windows Defender, deadline May 7), CVE-2026-21643 (Fortinet SQL injection), CVE-2026-34621 (Adobe Acrobat), CVE-2024-27199 (JetBrains TeamCity), CVE-2025-48700 (Zimbra XSS), CVE-2025-32975 (Quest KACE), and the three Cisco Catalyst SD-WAN Manager CVEs (CVE-2026-20122, CVE-2026-20128, CVE-2026-20133).
Is the Bitwarden CLI npm package safe to use after the supply chain attack?
The malicious version is specifically @bitwarden/cli@2026.4.0, identified by JFrog and Socket as part of the Checkmarx supply chain campaign. Current and other versions are not known to be affected. Organisations should audit their CI/CD pipeline dependency locks for this specific version. Any pipeline that pulled version 2026.4.0 should be treated as compromised — rotate GitHub tokens, npm tokens, SSH keys, .env secrets, GitHub Actions secrets, and all cloud credentials that the pipeline had access to.
Sources & references
- CISA — FIRESTARTER Backdoor Malware Analysis Report AR26-113a
- CyberScoop — US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied
- Cisco Talos — UAT-4356's Targeting of Cisco Firepower Devices
- Triskele Labs — Persistent FIRESTARTER Malware in Cisco Secure Firewall
- BleepingComputer — CISA orders feds to patch BlueHammer flaw exploited as zero-day
- Picus Security — BlueHammer & RedSun: Windows Defender CVE-2026-33825 Zero-Day Analysis
- The Hacker News — Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
- CISA — Known Exploited Vulnerabilities Catalog April 2026 additions
- CYFIRMA — Weekly Intelligence Report 24 April 2026
- WindowsNews.ai — FIRESTARTER Persistence Backdoor: Survives Patching
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities — CVSS scores, exploit status, and patch availability. The reference card your SOC team needs, free with your newsletter subscription.
No spam. Unsubscribe anytime.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
